Cloud computing and mobile devices have revolutionized our personal and professional lives. These innovations have unlocked a new age of elasticity and mobility. Along with this digital revolution, an unexpected transformation is taking place at the heart of server workloads and mobile devices. We are witnessing the decline of the general purpose operating system. The…

Now, even your security can be handled by cloud computing software–but consider these factors before you get on board. As a smart entrepreneur, the biggest problem to contend with regard to cybercriminals is that they’re smart entrepreneurs, too. They’re highly motivated and technically proficient workers. What they’re after isn’t fame or notoriety. It’s about money….

While enterprises typically have robust perimeter security such as firewalls and network Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), malware occasionally slips through to compromise the endpoints. Recent episodes involving the Zeus, Aurora/HYDRAQ, and Mariposa botnets have all thrived on compromised endpoints. A potential compromise at a medical clinic in Calgary/Canada that required…

As we started building out the Trend Micro Smart Protection Network four or five years ago, we realized that the shift to the cloud was going to be a major platform shift for the datacenter. We wondered if other datacenter operators were encountering the same types of issues that we were encountering. So we went…